A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is
We wanted to provide a regular annual venue for mathematicians to contribute to the cryptographic research community at this accelerated pace, and the Journal of Mathematical Cryptology was an ideal place ... Mathematicians primarily recognize publications in journals, whereas cryptographers almost always publish their results quickly in proceedings volumes of conferences which are the most prestigious venues ... of Mathematical Cryptology. ...doi:10.1515/jmc-2020-0170 fatcat:4sq6xvjilzg4ndkihh75zoftii
This issue of the Journal of Mathematical Cryptology collects selected papers on work presented to the meeting WMC 2008, held in Santander (Spain), October 23-25, 2008. ... The result of the evolution of technology and science is that today we are witnesses of an explosive growth in the applications of mathematics in cryptology. ... We also thank the managing editors of the Journal of Mathematical Cryptology, specially Rainer Steinwandt, who offered us the opportunity to do this job. ...doi:10.1515/jmc.2009.008a fatcat:6hco67zkwjhrrdobcz36qppb7a
Origins of Cryptology. 3 Each volume summarizes the treatises' cryptologic contributions and offers English translations of the chosen sections alongside the original Arabic. ... governments'' [15, p. 68; 12] . ...doi:10.1080/01611190903030904 fatcat:cgryqc3tq5aidm5yzctrg4la74
JOURNAL OF MATHEMATICAL CRYPTOLOGY is a forum for original research articles in the area of mathematical cryptology. ... Works in the theory of cryptology and articles linking mathematics with cryptology are welcome. ...doi:10.1515/jmc-2016-frontmatter1 fatcat:q6thyjainbet5gnsdcxefliizi
Lipton On January 5—6, 1981, the authors delivered a series of lectures entitled Cryptology in Revolution: Mathematics and Models to a meeting of the Ameri- can Mathematical Society. ... This survey of cryptology and computer security is an edited and expanded ver- sion of the notes which the Society published for the original lecture series. The presentation is organized as follows. ...
On January 5—6, 1981, the authors delivered a series of lectures entitled Cryptology in Revolution: Mathematics and Models to a meeting of the Ameri- can Mathematical Society. ... This survey of cryptology and computer security is an edited and expanded ver- sion of the notes which the Society published for the ‘The presentation is organized as follows. ...
The Historical Journal
Secondly, the greater volume of messages enciphered in that single system facilitated its solution. ... There are four technical factors, all of which stemmed from purely cryptologic factors. ...
The analysis shall proceed chronologically and present some relevant examples from the 16th century before focusing on the most important German cryptological author of his time, Duke August the Younger ... August had acquired almost 200 volumes relating directly or indirectly to cryptology. ... His sole goal in writing the Cryptomenytices was to present "the state of the art", for -as he put it in his Preface -cryptology to him was indeed an art form. 15 Nonetheless he was fully aware of the ...doi:10.1515/tmmp-2017-0018 fatcat:mebipusjbfhgjcix733asydaye
Then sessions in cryptology were conducted to make students acquainted with the field of cryptology and provide them with a methodology of how to apply its tools to e.e. cummings' selected poems ygUDuh ... After a thorough examination, two main findings arose: First, the participants in this research got familiar with the field of cryptology and its strategies; second, they also found a walkthrough to read ... The English poems of George Herbert. Cambridge: Cambridge University Press. Factor (JCC): 6.2987 NAAS Rating: 3.12 15. Vaudenay, S.(2006). ...doi:10.24247/ijeldec20187 fatcat:eskxzhgv4vb5vbtuk3fr72leju
This is a new quarterly journal devoted to all aspects of cryptology, with particular emphasis on computational, mathematical and statistical problems in cryptology. ... Ames, Mono- tonically convergent upper and lower bounds for classes of conflicting populations (pp. 3-14); H. A. Antosiewicz, A new view on constrained problems (pp. 15-19); H. T. ...
ISBN 3-540-65757-6 From the publisher’s description: “This tutorial volume is based on a summer school on cryptology and data security held in Aarhus, Denmark, in July 1998. ... Ed. 26 (1998), no. 4, 10-15. Summary: “Two constructions of authentication codes with arbi- tration from symplectic geometry are given. The parameters are computed. ...
The journal contains papers from the Russian-language journal Diskretnaya Matematika, the only journal of the Russian Academy of Sciences devoted to this field of mathematics. ... Discrete Mathematics and Applications covers various subjects in the fields such as combinatorial analysis, graph theory, functional systems theory, cryptology, coding, probabilistic problems of discrete ... Sergeev Upper bounds for the size and the depth of formulae for MOD-functions 15 Aleksandr A. ...doi:10.1515/dma-2017-frontmatter1 fatcat:7kdayfqrv5e3vd6q2amfcrs55y
Lecture Notes in Computer Science
The nonlinear lter functions used in such systems may leak information if they interact with shifted copies of themselves, and this gives us a systematic way to search for correlations between a keystream ... attacks on certain stream ciphers", in Journal of Cryptology v 1 1989 pp 159 176 MS2 W Meier, O Sta elbach, Nonlinearity criteria for cryptographic functions", in Advances in Cryptology | Eurocrypt 89 ... 12 18 16 26 10 3 20 11 12 19 18 27 18 4 16 12 23 20 12 28 17 5 14 13 13 21 10 29 15 6 21 14 13 22 15 30 19 7 17 15 19 23 15 31 17 We might h a v e hoped that ...doi:10.1007/3-540-60590-8_11 fatcat:fp4biuzdjbhkpm6d2skn564peu
Hairy graphs and the cohomology of Out(F_n) Karen Vogtmann, Cornell University Growth rate of an endomorphism of a group ... Saturday 3:15 -5:15 Length functions of right-angled Artin groups Ruth Charney, Brandeis University Morgan and Culler proved that a minimal action of a free group on a tree is determined by its length ... Kontsevich showed that the homology of Out(F_n) can be identified with the cohomology of a certain Lie algebra A. Morita constructed cocycles from elements of the abelianization of A. ...doi:10.1515/gcc.2011.011 fatcat:r5tisr7odzghlmbzofvjt567ea
of its witness. ... We discuss in particular a version of the Lyubashevsky scheme which is provably secure in the QROM. ... Zero-knowledge proofs of identity. Journal of Cryptology, 1(2):77–94, 1988. (Cited on page 2.) [Fis05] Marc Fischlin. ...arXiv:1306.0315v1 fatcat:vny4yr7hifgkxp4sg4mdwvsegu
« Previous Showing results 1 — 15 out of 1,516 results